instruction stringlengths 24 29.9k |
|---|
While symm. crypt. has around 256 bits of a key, why does public key crypt have a key that is much longer (1000's) ???
|
My web server is chrooted into /var/www, and its contents are available over the network.
One of my web applications needs access to a unix socket, and so that socket needs to be somewhere in /var/www to be accessible by the server.
Does it pose any security risk creating the socket in a web accessible directory?
|
I’m working on windows desktop application which is created using C++ (IDE : Qt creator). It has login panel, where i do user validation via https connection using openssl 1.0 library. Application is working in most of the machines, but i'm also experiencing "SSL Handshake failed" error while making https connection fr... |
How can I see all code signing signatures an executable has?
I know that requests for a tool are usually considered as opinion based, but I really can't find one and I don't expect many answers.
Background:
I have an executable that was signed by the vendor (for UAC purposes). The application was then tested by me and ... |
I'm responsible to create new accounts for some services on my job. Some of these service do not allow password change by the user, so in the case the user wants to change its password, he would need to tell me it or I should change it and tell him. In any case, the password has to be send.
So far I've been using email... |
Yesterday I got a cable modem, and on the back of the modem there is a small sticker with the name of the default SSID, which looks like Vendor-A11 and the default Pre-Shared Key, which is a long password containing both numbers and letters.
I found it convenient that when I want to connect some device to its Wifi, I j... |
Is it possible to extract userid from GPG public key?
I got public key only and want to know to whom it might belong. I find one possible workaround — to publish this information on keyserver — it decodes information and reveals it to public. But I'm not sure, I should do this.
Is it possible to extract userid using co... |
i'm wondering how safe it is to use createHTMLDocument to do HTML sanitization. I've tried to implement it like this:
function sanitize(string) {
var elm = document.implementation.createHTMLDocument().body;
elm.innerHTML = string;
// traverse and filter elm to only allow whitelisted elements and attributes
// e... |
I'm writing some security software, and don't want anyone to be able
to intercept data as its passed from client->server, and server->client.
The best way to do this is over HTTPS via SSL. However, I've read that you can't trust HTTPS, as Certificate Authorities can get hacked, or taken over by Governments.
I've also ... |
I'm writing some security software, and don't want anyone to be able
to intercept data as its passed from client->server, and server->client.
The best way to do this is over HTTPS via SSL. However, I've read that you can't trust HTTPS,
as Certificate Authorities can get hacked, or taken over by Governments.
I've also... |
I am working on a java program and I am now working on its network security. I want to use a secure connection since it transfers a lot of sensitive information.
On all security guides it is mentioned to always go with a standard way and dont use your own encryption/way.
Are there any security issues if I use my own pu... |
I'm a security newbie. I'm implementing oauth on my site and I want to ask where I should save my access token:
cookies
session (will be fetch from the server via ajax request)
I have backend (restful) and frontend (SPA). Communication only between them.
By the way what is recommended expire time for oauth?
|
I need to select a project for this semester. I'm a second year uni student in Ethical Hacking and Countermeasures. My idea was to see if using some kind of pattern based password cracking can be more efficient than standard brute forcing or dictionary attacks.
By pattern-based cracking I mean something like:
CvvcDcv
... |
Ok, so I am coming into this a little blind on how to go about allowing this app to store and check one's driver's license ID against the DMV or some other government agency. Basically, everything will be stored locally on the App, but then there needs to be a verification process either through using a PHP script to c... |
This question covers the risks of accepting Binary blobs in one's distribution.
This may be a very paranoid conspiracy question. But considering all the topics regarding the NSA in 2013 one cannot help thinking that the binary blobs in the Linux kernel could contain explicit security holes.
Where most of the blobs con... |
I have an app server hosting a CakePHP app and a database server hosting the databases. The servers are physically separate. The databases contain encrypted sensitive information. The encryption keys for the encrypted data are also stored in the database (which are themselves encrypted). The keys are decrypted by the... |
So, our database is using bcrypt with a high iteration/cost to store our users passwords. We're using https like intelligent people and we continue to work on finding ways to sidestep our own security before someone else does.
With that said, we are beginning a new marketing push with a new interface and the marketing ... |
If you don't want to read all of the details, skip to the bottom; I'll make a summary.
I created a computer program as a proof of concept (I threw it together in 12 hours, so I wrote it in Visual Basic to get it done quickly). Normally I'd be using Linux but my client wanted a Windows version, so I resorted to VB.
Anyw... |
When I visit livescore.com, ten seconds later I receive marketing emails from gambling companies. If I don't visit this site, I don't receive these emails. Similar things happen when I visit Twitter or Tumblr. I receive emails advertising their sites, even though I don't have Twitter or Tumblr accounts.
How do they kn... |
I have been encountering more and more clients needing their API (usually REST) endpoints tested for vulnerabilities and wanted to reach out to see if anyone has some recommendations beyond what I have been doing.
I am very familiar with the REST security cheat sheet from OWASP and have built a number of API's myself... |
I was recently reading about the attacks on SSL/TLS that CRIME and BEAST were able to exploit by attacking the compression in the secure session. Upon reading this I remembered that OpenVPN has compression as an option in the VPN server configuration. I was wondering if the same sort of attack on TLS could be used agai... |
I say that if a professional code breaker has a bunch of data, the encoded version of said data and the encoding method he can figure out the encoding key. It is just a matter of having enough data. Is this true?
How much data or how many characters (with matching coded characters) would a professional need in order t... |
This question is about SNORT- I m basically trying to detect PING FLOOD attack.
I have included the
rule**(drop icmp any any -> any any (itype:8; threshold, track by_src, count 20, seconds; msg:"Ping flood attack detected"; sid:100121))**
for that in the ddos.rule file of snort.
Attacking using the comm... |
(Sorry if this isn't in the right SE / is not relevant for security.stackexchange - seemed like the best choice)
Is there a way for two anonymous parties to establish that they are not previously known to each other, before revealing their identities?
Suppose that Alice and Bob are able to communicate anonymously and w... |
I have a web service which is used by a Flash client. Both the service and the Flash client is produced by me (read: my company). The Flash client communicates with the server over HTTPS.
One of the issues we have seen lately is that people decompile the Flash client and then create their own clients to interact with t... |
If an attacker knows my database username and password, what can he possibly do if he doesn't have access to my server? Let's say my database is using Microsoft SQL Server. Is there a way he can use those credentials to manipulate my database?
|
I am developing an Android app that will potentially handle sensitive user data, and some of it may be even considered medical data (for example user height, weight, alergies, etc).
What would be the recommended security practices to protect the user's data both from the client-side perspective as well as the server-si... |
In the early days we happily saved whatever password a person wanted to the database.
Later we decided that passwords must include certain characteristics like numbers, upper and lower case and defined lengths (sometimes a max of 8; yikes!).
Not too long after that some of us decided that certain characters like ; and ... |
Situation:
Consider the site: example.com, hosted at web server A.
A WordPress blog is to be installed on a different web server, B.
In order to route a WordPress installation to a subdirectory on the
main site, e.g. example.com/blog/, most suggestions on
StackOverflow recommend to use the Apache mod_proxy module, to
... |
UPDATE: My questions and concerns below boil down to: "Should I reject obviously poor passwords like 'hellomydarling' or 'password'? My guess is yes and I want to know to what extent. I'm using a password strength estimator to assist with that.
I have been doing research regarding usability verses security when it com... |
I need freeware tool for source code review for my application which used WebSphere Portal and Java as technology. Please provide me relevant information or links regarding this.
|
I'm wondering if to prevent the possibility of a compromised SSL certificate leading to the potential for sensitive information disclosure if it might be prudent to further encrypt data being passed over SSL.
Imaginary scenario: two web applications. One is a web application, the other is an application supplying an au... |
Can you give me an example of a short data string that, when decompressed using Zlib's DEFLATE method, expands to something much much longer?
More precisely: what is the nastiest decompression bomb that one can build for Zlib's DEFLATE? The figure of merit here is the compression ratio. If the compressed file is n by... |
In rules configuration of snort I have:
alert tcp any any -> any any (msg:"HTTP Connection"; react:block;)
However when I add:
alert icmp any any -> any any (msg:"HTTP Connection"; react:block;)
it gives me a error that react is not allowed for ICMP.
Is there any other way to enable this?
How can I block packets in ... |
I quote from this article Forget about hacking – your servers might get stolen:
Are data centers as secure as they want you to think?
Though security is often a selling-point for many data centers, they
aren’t necessarily safe from theft. There have been plenty of
incidents involving hardware theft from data cente... |
Can you run Side-Channel-Attacks against a PC which was found properly shutdown and powered off?
The attacker knows the cryto-tools used to encrypt the data. The attacker has full and unlimited physical access to the whole system. The system is not infected with any malware. The user who knows the passwords will not in... |
Suppose i have not written rule for a type of attack in SNORT; It is obvious that it wont show any alerts. I wanna develop a system wherein i capture packets that SNORT allows n do further processing on those packets to detect if those belonged to an attack or not!
So, how to i log packets which snort considers to be g... |
In the context of Key Management and encryption/decryption, what does "Deleting a Key" mean exactly? What are the implications of "Key Deletion", in terms of:
Decryption of the old data (i.e. data encrypted already using this Key)
Re-using the Key by creating it again (either accidentally or on-purpose)
Storage of the... |
I own a url shortening service. I want to deliver only legitimate statistics to my clients. There are possible scenarios that a particular user writes a script to automatically open the shortened URL, thus making the statistics look bad. What are the approaches one can follow to detect if a click is legitimate or not? ... |
Given that control characters are usually not rendered, but they are given a special meaning in most terminals, what reasons are there for terminal apps to continue to support copy-pasting of control characters?
One can mask a harmful code as described here for example, so that it causes issues when pasted into a termi... |
I am trying to make provision for resetting password if the user forgets his password. What I did is make a html page(say email.html) where the user will enter his email address. When the user submits his email address the webpage forwards it to a servlet, lets call it forgot_pass.java. Then a unique 128bit alpha numer... |
I'm exploiting a blind SQL injection point, which takes a variable as username then check if the username exists in a table.
(It's running MySQL 5.X with PHP)
So I'm using this to retrieve all databases:
valid_user_name' and (
SELECT substr(hex(schema_name), 8, 1)
FROM information_schema.schemata
WHERE sc... |
Let's say I want to hash some data, using SHA256, in order to prove I know something. Maybe it's my secret ID for something.
In the real of passwords we have moved from hashing -> hashing+salt -> cpu hard problems -> cpu+memory hard problems. However, the main reason we did all this is because passwords are (in the act... |
Is it bad security practice to have a password that will allow you to access any user account on a website for support purposes? The password would be stored in a secure manner and would be super complex. Huge mistake?
|
If someone hides their DNS traffic by encrypting it with a service such as OpenDNS's DNSCrypt, would you still be able to see which URLs they're viewing?
Also, if that person uses HTTPS 100% of the time, can you tell which pages they access?
Or would sniffing their packets show which pages and sites they were accessing... |
I'm looking at setting up an encrypted container with TrueCrypt (surprise) but I'm not sure whether I should use multiple files or if a large file would make any difference.
Does the file size or number of files matter beyond the fact that you would for example need a larger file or have access to all the key files?
|
The question is clear, I'm a programmer and wrote a software to disinfect the USB devices when they got the malware which hides the files and creates a shortcut of the virus .
Using this soft we can disinfect the data, But if the USB is replugged it'll get infected again ...
at this point I'm trying to prevent malwares... |
An annoyance of mine is when websites try to force me to use characters or a password policy that makes it difficult for me to remember (e.g. a number, lower-case, upper-case, special char, 5 - 10 characters)...
What would the pitfalls be of simply having a password strength calculator and only allow passwords that are... |
I am working on an android project for school and I am supposed to do a DHKE(Diffie Hellman Key Exchange). Everything works well, the problem is that it takes a lot of time (really a lot) to generate DHParameters. Basically, in my code, this is the part that is the most time (and battery) consuming:
KeyPairGenerator kp... |
I'm using several cloude storage services, like Dropbox. Each have windows app for its synchronization, and this app actually can read anything from my disc, not just files from its 'synchronized' folder. I want to make sure that this apps never access any other folder except sync folder. Is there a way to do so (using... |
I'd like to limit access to some of my REST api, such that only bidirectional SSL/TLS connections are accepted, where the "other side" matches a detailed, restricted, whitelist.
Is this something that's easily supported by the microsoft stack, as part of their MVC implementation - and, if it is, is there an example of ... |
I understand that it is bad practice to add passwords and secret tokens to source control, with obvious implications arising if you are working on an open-source or related project. Rather, you should store them as environment variables.
However, is it legitimate to add an encrypted private PEM key file to source cont... |
As i saw most of the internet is being load balanced even at DNS . And DNS load balancers takes decision on behalf of client's DNS . So I Am just curious to know if i will use 8.8.8.8 as nameserver in my ubuntu 12.04 box then what will be my location for the internet. Will my ISP's provided dns not be of any use. And M... |
The only reason I use BitTorrent is to download Linux distros, Open source apps and large documentation files. My ISP contacted me once and warned me:
Ok, you aren't downloading anything illegal or pirated, but our network traffic doesn't allow p2p in general (implying that I should stop).
So, I chose a VPN and tunne... |
Actually, I'd like to ask 3 questions. But since they are very related, I'll ask them all here. I use Ubuntu 12.04.4.
Situation 1: I use Terminator, in one of its terminals I launch sudo iotop (because it doesn't work without root access). Question is: can a malware gain root privileges via a process that is run with u... |
This may sound stupid for everyone who knows more than me about the UNIX-System and security in software:
Imagine you have a program trying to cause harm by deleting files. You just do something like "rm -rf /home/" and get an error message, because rm checks whether you are allowed to delete this directory or not and ... |
I am not sure if this is the best place to post this type of question.
I have come up with function which, I believe, is a very secure method of hashing. (I could be completely wrong).
Here's the code:
function hashPW($password){
$letters = array('a','b','c','d','e','f','g');
$numbers = array(1,2,3,4,5,6,7);
... |
As far as I understand there are two approaches to perform CSRF protection:
1) CSRF token per session - the token is generated once per session. This is the easiest way;
2) CSRF token per request - the new token is generated on each request, and the old one becomes invalid.
This is more secure but the webapp might be b... |
When I record the network tab in Chrome Developer Tools when logging in to my site I find that the username and password are stored in plaintext under form data.
You can also find it in Safari, Firefox and Opera too.
I tried logging in to various sites like Google, The Verge and Reddit and they all do the same thing as... |
Consider the following scenario:
1. When user visits a webapp, server:
a) initialize the session;
b) generates CSRF token;
c) saves token to session;
d) saves token to client's cookie via Set-Cookie header.
2. On each POST request server compares cookie token (which comes automatically with Cookie heade... |
A question for cryptography experts. Imagine we have a conceptual Notes.app:
There are notes (title|content) stored as AES-256 encrypted strings
Application has to present a list of all notes (titles) in a list on its main window
Every title|content is encrypted with a key, generated from a password and a salt
Let's i... |
How would we detect and locate a rogue DHCP server on our local area network?
|
I have a PHP sheller file (like c99 file) but it's encoded with this functions:
eval(gzinflate(base64_decode("7P3rehblahblah"))
The clamav virus scan can't detect it. How can I detect a virus and sheller like that?
|
I have clients which are all browsers. All clients render just a single page application getting data from a Web API. The design of the API follows REST principles.
I use token-based authentication without OAuth because I have no third parties for my API and I want to feel how security can hurt my brain ;-)
The format ... |
In private network (as in using a private IP address space) at a cloud provider, other customers have access to the same private network. I have secured the communication between many hosts and services with TLS provided by Stunnel.
Background: Current Stunnel Configuration
To simplify the current situation, let us ... |
In other words, my (long version) question is: Are developers able to get away with, more using ASP.net than PHP in terms of writing secure code for their apps?
I ask this because ASP.net has many built-in security mechanisms such as SQL injection prevention. PHP, as far as I know, does not, at least not in that sens... |
Websites like
http://www.cvedetails.com/
http://www.securityfocus.com
This websites show information about vulnerabilities and exploits, which other sites are similar?
|
I am looking for a Linux based encryption system (like Truecrypt) that has the ability to do the following:
Encrypt a partition or external drive that it can only be read from the same computer where it was encrypted. If the partition or external drive is brought to another computer it will not read the drive. Basical... |
I have simple situation, we are in IT center and I need to develop a simple one form 4 fields that contains a salary field, I need the programmer of our IT center could not know the salaries of other employees when he checks the database and the application he created
|
I have a requirement for storing multiple symmetric encryption keys in a database. What I want to know is, are there any standard, accepted practices for storing these keys in a database ?
To add a bit of context, I know that encrypting the encryption key itself is a bad idea because, then where would I securely store ... |
In our small company we have very high traffic outbound from local network to server which is getting blocked, and slow downs our server respond time. Especially at night.
I am not security specialist so I am not sure what where and how to check that.
This information above I have from out IT partner which send email ... |
I was wondering the difference in term of Security, Computational cost and Network overhead between the use of :
A Key-Exchange Algorithm (e.g. Diffie–Hellman) to set up a symmetric key.
The generation by the Client of a symmetric key and the send it ciphered (e.g. RSA) to the Server.
Indeed, I'm designing a protocol... |
PCI DSS Version 3.0, Requirement 9.5.1 says that we have to store media backups in a secure location, preferably an off-site facility such as an alternative or backup site or a commercial storage facility.
I don't understand this requirement. What is an offsite facility for data protection?
How do you store the media b... |
I overheard the following statement today:
We shouldn't use /api (e.g. in a RESTful URL like /api/v1/users/get) in our RESTful URLs anymore because it makes it easier for people to Denial Of Service attack our site. If we just give it a name like /users/get then people will be less likely to think it's an API and the... |
My goal is to check if the password used by admin is the default password.
I work on a Linux-based router. I know the password is stored as a hashed value in /etc/passwd.
In generic Linux machines, /etc/passwd has a field to indicate which hashing algorithm is used (for e.g. $1 for MD5).
Is there any way to get the sal... |
I have been given an assignment from my school, in wich I have been given a Virtual image of a compromised system. The first thing I need to do is setup a environment to wich we can mount the image. I need to choose an OS, and I was wondering: What should I choose, and why? If anyone could give me any pointers I should... |
Since encryption keys are session-based in WPA2 enterprise, if person A obtains person B's credentials, will person B's encryption key still be safe? Is there any way person A could use person B's credentials to find the encryption key for a given session?
|
I have a REST web service which already implements oauth authentication mechanism via browser.
I would to expose my API to a number of mobile clients programmed
by third parties.
In this scenario 4 actors are involved:
My Web application A
The authentication Provider P (e.g Facebook/Google/Twitter/etc)
The mobile app... |
I'm working on a project that is creating two new, separate web modules (possibly even on different servers) to support a new web application, with one serving up a static JS-based UI and the other project providing an API. The API will be secured by role, meaning that you must be logged-in and have the right role(s) i... |
There's a Classic ASP application at my job that is (I believe) highly vulnerable to SQL injection. I want to prove to management that this code isn't secure, but all I'm able to do is insert "SQLINJ" log records in the database:
Public function preventSQLInjection(lstr)
BlackList = Array("--", ";", "'", "/*", "*/... |
Let's say, the HTTP security headers below are applied to all HTML pages of a site:
HTTP Strict Transport Security (HSTS)
X-Frame-Options (XFO)
X-XSS-Protection
X-Content-Type-Options
Is it OK to not put those HTTP security headers on non HTML resources (images, JavaScript files, etc) but those headers are applied to... |
Okay, so I am selling a smartphone, to the guy who lives in UK, or that is what he says. So for the money transfer he asks me these things.
Name
Bank Name
Account Number
Iban
Swift Code.
Is it okay to give them to him, BTW I live in the Latvia, and he already knows my email, whats connected to my bank account and he ma... |
Given an authenticated user on A.com, we want to redirect the user to B.com so that she'll be immedaitely authenticated. The scheme I'm considering is very basic:
A.com and B.com both share key S.
On A.com, redirect the user to https://B.com/auth?userid=userid&time=current_time&mac=MAC where MAC is HMAC-SHA256(userid +... |
I'm trying to work out a somewhat anonymous secure messaging system, and was hoping someone could validate my overall approach. Keep in mind, this all takes place over HTTPS.
Authentication
While the transport supports client certificate authentication at the protocol level, we don't want to have to issue certificates,... |
Stack Exchange API 2.2 is finally out,
(Yay!)
Reading through the linked blog post, i notice the line:
Login methods that don’t use OAuth can’t be made public for security reasons.
Is this something to worry about?
Seems kinda suspicious.
Sounds like Security Through Obsurity.
"If know one knows how it works they can... |
I have had a GMail ever since it was created, so it's an email address that is easy to remember, but also easy for somebody else to get confused with.
Since I'm not going to post my email address here, I'll put the format for it which is [first name][2 digit number]@gmail.com. Because of this, somebody unknowingly (or... |
From the thread Does OpenPGP key expiration add to security? , we know that the faster the keys expire, the greater our security. The minimum expiration for a GPG key seems to be 1 day. Thus, isn't it much more secure to generate a new GPG key (that expires in 1 day) once per day?
That means, we generate a new GPG key ... |
I manage a couple of twitter accounts for businesses/websites that are separate from my personal account. For simplicity, I prefer to log in from an incognito window so that I don't need to log out of my primary (personal) twitter account.
I was shocked when I recently logged into one of the secondary accounts in an i... |
I just cleaned up a virus infection on my computer (running windows) by running an Anti Virus Scan. The malicious executable files are now deleted. However, the registry entries made by it remain. Also, this particular malware changed attributes on removable drives to make files and folders hidden. These files continu... |
Here’s a quote from a reddit discussion:
… for poker [a cryptographically secure RNG] is completely unnecessary.
If you have an appropriate unpredictable seed, and you are throwing away a lot of the randomness, MT is perfectly safe.
I’d normally write this off as ignorance, but this goes on:
I've actually implemente... |
I'm implementing a REST service that requires authentication. I cannot store any per-user state (such as a randomly-generated token) because my service does not have direct access to a database, only to another backend service.
The solution I came up with is creating a JSON Web Token (JWT) when the user authenticates. ... |
We can found on the debian's website CPE/Aliases List, CVE List related to packages. But I can't figure out where can we know which patch of packages correct which vulnerabilities ? For instance :
bind9 1:9.7.3-1~squeeze11 corrects which problem ?
|
About one year ago, for about two months, lots of user accounts with unverified login email address started to pile-up.
All addresses belonged to @yahoo.com. It appears (don't know for sure) some sort of Yahoo! Messenger vulnerability allowed some hackers to spread to many systems and then create accounts on our websit... |
Now that Windows XP will stop being supported by Microsoft, it has become common knowledge that it should be abandoned for a modern operating system in most cases.
However, I have the corner case where I am using Windows XP to run a point of sales system (POS). If I am not going to perform any tasks other than using th... |
I have a ASP.NET/IIS server. I want to restrict my server to only accept request from Android and Iphone(IOS) applications. I have heard about HMAC. Can HMAC help me?
|
When I was changing my router my ISP technician told me that he has remote access to all routers provided by ISP. Was that true? If that is a fact it scares me...
|
usually in office or wherever whenever we are blocked with gmail and facebook websites,we used to browse the site with the proxy sites,we used to pass our login data through proxy sites,my question is since we are exploring through proxy servers,is it there any high risks evolve around while using proxy sites?
is it po... |
I'm working on a uni project where I will attempt to create a malware that uses some form of genetic algorithm to "evolve" itself out of being recognized by a signature based AV software.
For this I will need to code my own small AV programmed to detect the strain of malware. So my question is, what patterns do signatu... |
I am creating a site that will allow users to input their banking account number so I can pay them for their services. I am far from a security expert and would like some insights into the best practices for encrypting this data.
So far I have gathered that at a bare minimum I should have 256 bit encryption with a sal... |
When we are using a FPGA for file, container or full-disk encryption, we need to input a password for encryption/decryption process. How can we prevent side channel attacks to steal password for a stolen FPGA?
Considering without such 'initiation password' an attacker with
physical access would just need to take the F... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.